zarkones / XENAView external linksLinks
XENA is an innovative C2 made fully in Go. With hacking automation features.
☆384Apr 26, 2025Updated 9 months ago
Alternatives and similar repositories for XENA
Users that are interested in XENA are comparing it to the libraries listed below
Sorting:
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆228Dec 3, 2023Updated 2 years ago
- C2 writen in Rust & Go powered by Tor network.☆153Oct 30, 2025Updated 3 months ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆441Jan 29, 2026Updated 2 weeks ago
- A C2 post-exploitation framework☆483Jan 24, 2024Updated 2 years ago
- ☆29May 19, 2023Updated 2 years ago
- Modules used by the Havoc Framework☆264Jun 17, 2024Updated last year
- A modular C2 framework☆506Updated this week
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,151Apr 17, 2025Updated 9 months ago
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆592Updated this week
- C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.☆1,097Jun 25, 2024Updated last year
- An open-source, centralized HTTPS botnet☆172Dec 10, 2022Updated 3 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆91Oct 10, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆78Apr 11, 2023Updated 2 years ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,722Jan 16, 2026Updated 3 weeks ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆216Nov 3, 2025Updated 3 months ago
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.☆1,192Apr 16, 2025Updated 9 months ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆591Jun 12, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 10 months ago
- Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning☆14Dec 26, 2022Updated 3 years ago
- Simulate the behavior of AV/EDR for malware development training.☆562Feb 15, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- A command and control framework written in rust.☆385Sep 4, 2025Updated 5 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆440Oct 1, 2025Updated 4 months ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆293Jul 15, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,364Oct 27, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,497Dec 21, 2023Updated 2 years ago
- A cross platform C2/post-exploitation framework.☆706Oct 8, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year